Series-1 (Sep.-Oct. 2021)Sep.-Oct. 2021 Issue Statistics
- Citation
- Abstract
- Reference
- Full PDF
- Index Page
- Cover Paper
Paper Type | : | Research Paper |
Title | : | Design of 32 States, Rate 4/5, 32 QAM, TCM Code for Fading Channel |
Country | : | India |
Authors | : | Raj Kumar Goswami |
: | 10.9790/2834-1605010108 |
Abstract: If we look at the communication system per se then we find that the coder and modulator are two different sections and function independently. Therefore, if the only coding rate is varied as per the design by keeping other parameters same then this directly affects the bandwidth (BW) of the system. For example, if the coding rate is 1/2 the bandwidth reduced to one half and if rate is 1/3 then BW reduces to one third and likewise. However, there is a method by which the BW can be preserved and this can be done if coding and modulation are combined, which means that they do not function independently and whenever the coding rate is changed then the modulation is also changed accordingly. Let us take an example when no coding is employed and the modulation scheme.....
Keywords: Convolutional Code, TCM, QAM.
[1]. Ezio Biglieri, Dariush Divsalar, Peter J. Mclane and Marvin K. Simon, Introduction to Trellis-Coded Modulation with Applications, Maxwell Macmillan International Editions, 1991.
[2]. Christian B. Schlegel and Lance C. Pe´ rez, Trellis and Turbo Coding, John Wiley & Sons Inc., Publication, 2004
[3]. Baharuddin et al Performance Analysis of Trellis Coded Modulation and Diversity Combining on Wireless Channel, 2021 IOP Conf. Ser.: Mater. Sci. Eng. 1041 012023
[4]. Zhuqing Yue et al Trellis coded modulation with three-dimension 9QAM mapping based on a novel probabilistic shaping method, Optical Communication Volume 449, 15 October 2019, Pages 45-52
[5]. L. Hanzo, S. X. Ng, T. Keller, and W. Webb, Quadrature amplitude modulation: From basics to adaptive trellis-coded, turbo-equalised and space-time coded OFDM, CDMA and MC-CDMA systems, pp. 746–748. Wiley-IEEE Press, 2nd ed., December 15, 2004.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: A communications protocol illustrates the rules for sending blocks of information [each referred to as a Protocol Data Unit (PDU)] from one node in a network to another node. Protocols are generally defined in a layered mode and supply all or possibly part of the services specified by a level of the OSI guide model. A protocol specification explains the operation of the process and could also propose the technique the protocol requires to be realized. In this paper, we discuss that a Methodology for the Design and Implementation of Communication Protocols for Embedded Wireless Systems. Communication protocol design involves for complementary domains: specification, verification, performance estimation, and implementation. Usually, these technologies are treated as separate, unrelated stages of the design: formal specification, formal verification, and implementation, in particular, are seldom approached from an integrated systems point of view. This paper presents a design methodology that employs a blend of formal and informal mappings to process a high-level specification into an implementation.
Keywords: Protocol data, Embedded system, WPAN, WSN, Infopad, SDL, SMV
[1]. Devare, Manoj. (2018). Low Power Communication Protocols for IoT-Enabled Applications. 10.4018/978-1-5225-3805-9.ch003.
[2]. Daryl Narakadan, SadhanaPai, and Manita Rajput (2018) - Wireless Communication between Embedded Systems based on FPGA. International Journal of Engineering & Technology, 7 (4.41) (2018) 66-70
[3]. Stefan Marksteiner, V´ıctor Juan Exposito Jim ´ enez, HeribertVallant, HerwigZeiner (2018) An Overview of Wireless IoT Protocol Security in the Smart Home Domain. arXiv:1801.07090v1 [cs.CR] 22 Jan 2018
[4]. WojciechStaszewski, Adam JABŁOŃSKI, Kajetan DZIEDZIECH (2018) - A Survey Of Communication Protocols In Modern Embedded Condition Monitoring Systems. Diagnostyka. 2018;19(2):53-62.
[5]. Sarawi, Shadi& Anbar, Mohammed &Alieyan, Kamal &Alzubaidi, Mahmood. (2017). Internet of Things (IoT) Communication Protocols: Review. 10.1109/ICITECH.2017.8079928.
- Citation
- Abstract
- Reference
- Full PDF
Abstract:In this paper, Geographic Information System (GIS)-based Path loss models for three locations , namely Ughelli, Odeama Creek and Diebu creek in the Southern Nigeria have been achieved. The risk of manually going to the fields to take measurements of relevant link budget parameters has been drastically reduced by using GIS; and more accurate results with clear visualization from point of operation were also achieved. In this work, a program was written in Visual Basic for Applications (VBA) to automatically compute the path loss using Cost 231 Hata Model, and display it spatially on an administrative map and satellite imagery (Land Use/Land Cover) using ArcMap 9.0.......
Keywords: Southern Nigeria, Geographic Information Systems, Path Loss, Cost 231 Hata, Model
[1]. Baldassaro,P.M, Bostian.C.W, Carstensen.L.M, and Sweeney.D.G (2002): "Path Loss Predictions and Measurements over urban
and rural terrain at frequencies between 900 MHz and 28 GHz." Proc. IEEE AP-S2002 International Symposium, in press.
[2]. Biebuma J.J, Omijeh B.O, Nathaniel M.M (2014), " Signal Coverage Estimation Model for Microcellular Network Propagation"
IOSR Journal of Electronics and Communication Engineering Vol. 9, Issue 6, pp 45-53.
[3]. Biebuma, J.J, Omijeh, B.O (2013), "Pathloss Model Using Geographic Information System, International Journal of Engineering
and Technology. Vol.3 No.3, pp 269-275
[4]. Gupreet Singh Bola and Gurpreet Singh Saini(2013) Path Loss Measurement and Estimation Using Different Empirical Models For
WiMax In Urban Area, Area International Journal of Scientific and Engineering Research, Volume 4, Issue 5, May 2013
[5]. Hata, M. (1980); Empirical Formula for Propagation Loss in Land Mobile Radio Services; IEEE Trans. Vehicular Technology.....
- Citation
- Abstract
- Reference
- Full PDF
Abstract : The problems of the acts of terrorism, community and general insecurity threats all across the spheres of the entire societal activities, is worrying challenges encountered by the communication agents almost everywhere around the globe. This may not escape being attributed to the culture of the centrality of communication regulation and dispensation, as regards the media general role. Why, because these vices are always on the increase mostly affecting the lives of the masses of the local settlement. Though, being GSM, a vital tool used in combating and fighting the said insecurity challenges, the basic aim of this presentation is to find out the role of mass media as regards GSM over security matters together with the facilitating criminality role they play detrimental to general national security reliability because it is assumed that criminals do find it easy and obtainable using the tool in finding much......
Keywords: Terrorism, Human insecurity, National Insecurity, GSM.
[1]. Adache. J. E. (2010). Objective in security story reportage and the imperative of balancing the two sides: Military role and media responsibility In M. D, Yusuf; The Military. The media and Nigeria's national security. Nigeria: Gold Press Limited.
[2]. Danladi, A. A. (2013). The role of the media in national security in Nigeria: 1960-1999. Arabian Journal of Business and Management Review, 2.
[3]. Edward. W. (1994). Culture Imperialism. New York: Vintage Publishers.
[4]. Ekpu. R. (2010). Media practitioners and military operators as patriots and partners n progress. In M. D. Yusuf, The military, the media and Nigeria national security. Nigeria: Gold Press Limited.
[5]. Franceschetti, G. (2011). Homeland security: Threats, countermeasures, and privacy Issues, Norwood, MA: Article House
- Citation
- Abstract
- Reference
- Full PDF
Paper Type | : | Research Paper |
Title | : | MMSE Rake Receiver and Channel Estimation in WCDMA Communication Systems |
Country | : | Iraq |
Authors | : | Mohammed H.khaleel || Hayder H.Mohammed |
: | 10.9790/2834-1605012934 |
Abstract: We address the problem of joint beam-forming and multipath channel parameters estimation in Wideband Code Division Multiple Access (WCDMA) communication systems that employ Multiple-Access Interference (MAI) suppression techniques in the uplink (from mobile to base station). Several types of Rake Receivers like A-Rake, S-Rake, P-Rake, Adaptive frequency Rake, Time frequency Rake, Conventional MMSE Rake and Adaptive MMSE rake are used for WCDMA. In this paper we observed that the BER performance of the Adaptive MMSE Rake receiver gives better result.....
[1]. T. Ojanpera and R. Prasad, Wideband CDMA for Third Generation Mobile Communications. Boston, London: Artech House, 1998.
[2]. G. L. Turin, "The effects of multipath and fading on the performance of direct sequence CDMA systems," IEEE Trans. Veh. Technol. , vol. VT- 33, pp.213-219, Aug. 1984.
[3]. J. K. Cavers, "An analysis of pilot assisted modulation for Rayleigh fading channels," IEEE Trans. Veh. Technol., vol. 40, pp. 689–693, Nov. 1991.
[4]. S. Buzzi and H. V. Poor, "Channel estimation and multiuser detection in long-code DS/CDMA systems," IEEE Journal Selected Areas in Comm., vol. 19, pp. 1476 - 1487, August 2001.
[5]. Y. Li, L. Cimini, and N. Sollenberger, "Robust channel estimation for OFDM systems with rapid dispersive fading channels," IEEE Trans. Commun., vol. 46, pp. 902-915, July 1998.
- Citation
- Abstract
- Reference
- Full PDF
Abstract: For D2D communication to take advantage of various new services introduced by 3GPP project, D2D devices are required to form clusters. Clustering enables proximate devices to communicate and share common resources, thus saving scarce network resources such as bandwidth and energy. The implementation of cluster in cellular networks (especially 5G/6G) leads to better energy/spectral efficiency and traffic signaling reduction than the traditional non-clustered cellular networks. Though elaborate work on the survey and classification of clustering algorithms in cellular networks have been done by some literatures, but a review of details of clustering techniques in D2D communications is lacking. The several benefits of clustering demand that various aspects of clustering in D2D communications be reviewed. Thus the aim of this paper is to review various clustering approaches in D2D communications, including the techniques adopted and.....
Keywords: D2D, Clustering, Cluster Head Selection, Cluster Algorithms, Social Aware
[1]. Gandotra, P. & Jha, R. K. (2016). Device-to-device communication in cellular networks: A survey. Journal of Network Computer Applications, 71(C), 99–117. Retrieved from https://www.sciencedirect.com/science/article/pii/S1084804516301229?via%3Dihub
[2]. Condoluci, M., Militano, L., Orsino, A., Alonso-Zarate, J. & Araniti, G. (2015). LTE-Direct vs. WiFi-Direct for machine-type communications over LTE-A systems. 2015 IEEE 26th International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC): Workshop on M2M Communications: Challenges, Solutions and Applications, 2298-2302. Retrieved from https://www.researchgate.net/publication/287644192_LTE-direct_vs_WiFi-direct_for_machine-type_communications_over_LTE-A_systems
[3]. Adnan, M. H., & Ahmad Zukarnain, Z. (2020). Device-To-Device Communication in 5G Environment: Issues, Solutions, and Challenges. Symmetry, 12(11), 1762. MDPI AG. Retrieved from http://dx.doi.org/10.3390/sym12111762
[4]. Ali, K., Nguyen, H. X., Vien, Q., Shah, P., & Chu, Z. (2018). Disaster management using D2D communication with power transfer and clustering techniques. IEEE Access: Special Section on Advances in Interference Mitigation Techniques for Device-To-Device Communications, 6, 14643-14654. Retrieved from https://core.ac.uk/download/pdf/160274938.pdf
- Citation
- Abstract
- Reference
- Full PDF
Abstract: This paper presents a new control technique for multilevel inverter based DSTATCOM to compensate reactive power and improve the Power Quality (PQ) in distribution system. In the proposed approach, Artificial Bee Colony (ABC) algorithm is employed for enhancing the learning procedure of Optimized Recurrent Neural Network (ORNN) for mitigating the PQ issues. The ORNN technique is utilized for selecting the ideal control signal of multilevel inverter through the optimal adjustments of control variables. The proposed strategy creates an ideal control of the DSTATCOM to improve the quality of power and manage the line voltage by providing proper compensation. With this control technique, PQ issues are settled with precision and rapid execution to diminish the dip and surge issues in distribution system. This work is carried out using MATLAB/Simulink platform and the execution is assessed by comparing with various techniques like Fuzzy, ANN and ANFIS.
Keywords: ORNN, DSTATCOM, PQ, Distribution System, Multilevel Inverter
[1]. O. Mahela, A. Shaik and N. Gupta, "A critical review Of detection and classification of power quality events", Renewable and Sustainable Energy Reviews, Vol. 41, pp. 495-505, 2015.
[2]. O. Mahela and A. Shaik, "Power quality improvement in distribution network using DSTATCOM with battery energy storage system", International Journal of Electrical Power & Energy Systems, Vol. 83, pp. 229-240, 2016.
[3]. M. Saini and R. Kapoor, "Classification of power quality events – A review", International Journal of Electrical Power & Energy Systems, Vol. 43, pp. 11-19, 2012
[4]. W. Tareen, S. Mekhilef, M. Seyedmahmoudian and B. Horan, "Active Power Filter (APF) for mitigation of power quality issues in grid integration of wind and photovoltaic energy conversion system", Renewable and Sustainable Energy Reviews, Vol. 70, pp. 635-655, 2017.
[5]. B. Zhou, W. Li, K. Chan, Y. Cao, Y. Kuang, X. Liu and X. Wang, "Smart home energy management systems: Concept, configurations, and scheduling strategies", Renewable and Sustainable Energy Reviews, Vol. 61, pp. 30-40, 2016.